A vulnerability, which was classified as critical, was found in F5 BIG-IP and BIG-IP Next. This affects an unknown part of the component SSL Profile Handler. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2025-21087. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in F5 BIG-IP up to 17.1.1 and classified as critical. This issue affects some unknown processing of the component Message Routing Profile. The manipulation leads to resource consumption.
The identification of this vulnerability is CVE-2025-20058. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in F5 BIG-IP up to 16.1.4/17.1.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component Diameter Endpoint. The manipulation leads to missing release of resource.
This vulnerability is handled as CVE-2025-22891. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in F5 BIG-IP up to 17.1.1. It has been declared as critical. This vulnerability affects unknown code of the component URL Categorization. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2025-24497. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in F5 BIG-IP. This issue affects some unknown processing of the component Configuration Utility. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-24320. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in F5 BIG-IP up to 16.1.4/17.1.1 and classified as problematic. Affected by this issue is some unknown functionality of the component APM Access Policy Endpoint Inspection. The manipulation leads to insufficient verification of data authenticity.
This vulnerability is handled as CVE-2025-23415. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in F5 BIG-IP up to 17.1.1. This affects an unknown part of the component iControl REST Endpoint. The manipulation leads to command injection.
This vulnerability is uniquely identified as CVE-2025-23239. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
The North Korea-linked APT group Lazarus uses a cross-platform JavaScript stealer to target crypto wallets in a new hacking campaign. Bitdefender researchers reported that the North Korea-linked Lazarus group uses fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver a cross-platform JavaScript stealer to target crypto wallets in a new hacking campaign. Scammers lure […]
Microsoft has released a PowerShell script to help Windows users and admins update bootable media so it utilizes the new "Windows UEFI CA 2023" certificate before the mitigations of the BlackLotus UEFI bootkit are enforced later this year. [...]
Microsoft has released a PowerShell script to help Windows users and admins update bootable media so it utilizes the new "Windows UEFI CA 2023" certificate before the mitigations of the BlackLotus UEFI bootkit are enforced later this year. [...]